General
-
Target
a7f52eedcc6151651cc7abeedf4c65148f9965046cf5dcc26f3d79b850685ab9
-
Size
908KB
-
Sample
230321-3dq2esdf86
-
MD5
aeb426f4d51b50fdc53018c226d718fc
-
SHA1
cd53ecac0e27001286f1dcef6fe0ea8271541320
-
SHA256
a7f52eedcc6151651cc7abeedf4c65148f9965046cf5dcc26f3d79b850685ab9
-
SHA512
a4c12a5f957a6ab12cfad3ffdbf41fa9afdf4dd99825023047d7bf86d5d298276940a793cb28c652af204c0c17b9ac56629bb0922bf96752d49e4513ed8f2935
-
SSDEEP
12288:aMrNy90YSODPUByVELNwxdB5usH2nKn1pulKcXT2jf92jv4/9Qf3x/x14OD:Xy/SGMB9e7ubno9Wij0vwQfZx9D
Static task
static1
Behavioral task
behavioral1
Sample
a7f52eedcc6151651cc7abeedf4c65148f9965046cf5dcc26f3d79b850685ab9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
a7f52eedcc6151651cc7abeedf4c65148f9965046cf5dcc26f3d79b850685ab9
-
Size
908KB
-
MD5
aeb426f4d51b50fdc53018c226d718fc
-
SHA1
cd53ecac0e27001286f1dcef6fe0ea8271541320
-
SHA256
a7f52eedcc6151651cc7abeedf4c65148f9965046cf5dcc26f3d79b850685ab9
-
SHA512
a4c12a5f957a6ab12cfad3ffdbf41fa9afdf4dd99825023047d7bf86d5d298276940a793cb28c652af204c0c17b9ac56629bb0922bf96752d49e4513ed8f2935
-
SSDEEP
12288:aMrNy90YSODPUByVELNwxdB5usH2nKn1pulKcXT2jf92jv4/9Qf3x/x14OD:Xy/SGMB9e7ubno9Wij0vwQfZx9D
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-